Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Engeniustech
Engeniustech ews356-fit Engeniustech ews356-fit Firmware |
|
| CPEs | cpe:2.3:h:engeniustech:ews356-fit:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:ews356-fit_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Engeniustech
Engeniustech ews356-fit Engeniustech ews356-fit Firmware |
Tue, 12 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Engenius
Engenius ews356 Fit |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:o:engenius:ews356_fit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Engenius
Engenius ews356 Fit |
|
| Metrics |
cvssV3_1
|
Mon, 11 Nov 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EnGenius EWS356-FIT devices through 1.1.30 allow blind OS command injection. This allows an attacker to execute arbitrary OS commands via shell metacharacters to the Ping and Speed Test utilities. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-12T16:27:15.034Z
Reserved: 2024-05-19T00:00:00
Link: CVE-2024-36061
Updated: 2024-11-12T16:26:15.845Z
Status : Analyzed
Published: 2024-11-11T20:15:17.673
Modified: 2026-01-26T16:12:02.350
Link: CVE-2024-36061
No data.
OpenCVE Enrichment
No data.